Publications

You can also see my Google Scholar Public Profile.

Conference Publications

  1. A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks
    David Rodriguez and Ram Krishnan
    19th International Conference on Information Systems Security, (ICISS ’23), Raipur, India, December 16 – 20, 2023.
  2. Learnable Image Transformations for Privacy Enhanced Deep Neural Networks
    David Rodriguez and Ram Krishnan
    IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, (IEEE TPS ’23), Atlanta, Georgia, November 1 – 3, 2023.
  3. An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning
    David Rodriguez and Ram Krishnan
    37th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, (DBSec ’23), Sophia Antipolis, France – July 19 – 21, 2023.
  4. Utilizing the DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems (poster)
    Safwa Ameer, Ram Krishnan, Ravi Sandhu and Maanak Gupta
    ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, North Carolina, USA, April 24-26, 2023.
  5. MiCAM: Visualizing Feature Extraction of Nonnatural Data
    Randy Klepetko and Ram Krishnan
    International Conference on Machine Learning and Soft Computing (MLSC 2023), Copenhagen, Denmark, January 28-29, 2023.
  6. Administration of Machine Learning Based Access Control
    Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi Sandhu
    European Symposium on Research in Computer Security (ESORICS) 2022, Copenhagen, Denmark, September 26-30, 2022.
  7. Adversarial Attacks in Machine Learning Based Access Control
    Mohammad Nur Nobi, Ram Krishnan and Ravi Sandhu
    Italian Conference on Big Data and Data Science (ITADATA 2022), Milan, Italy, September 20-21, 2022.
  8. Toward Deep Learning Based Access Control
    Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu
    ACM Conference on Data and Application Security and Privacy (CODASPY 2022), Baltimore, MD, April 25-27, 2022
  9. Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Sherifdeen Lawal and Ram Krishnan
    International Conference on Secure Knowledge Management in the Artificial Intelligence
    Era (SKM ’21), Virtual Event, October 8-9, 2021, 13 pages.
  10. Analyzing CNN Models’ Sensitivity to the Ordering of Non-Natural Data
    Randy Klepetko and Ram Krishnan
    International Conference on Secure Knowledge Management in the Artificial Intelligence
    Era (SKM ’21), Virtual Event, October 8-9, 2021, 19 pages.
  11. Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain
    Sherifdeen Lawal and Ram Krishnan
    IEEE International Conference on Omni-layer Intelligent systems (IEEE COINS ’21), Virtual Event, August 23-26, 2021.
  12. On the Role of Deep Learning Model Complexity in Adversarial Robustness for Medical
    Images.
    David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan and Yufei Huang
    International Conference on Intelligent Biology and Medicine (ICIBM 2021), Virtual
    Event, August 8-10, 2021.
  13. Access Control Policy Generation From User Stories Using Machine Learning.
    John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu
    35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
    (DBSec ’21), Virtual Event, July 19-20, 2021, 18 pages.
  14. Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study.
    Sherifdeen Lawal and Ram Krishnan
    In Proceedings of 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), Virtual Event, May 15-17, 2021.
  15. Role-Based Access Control Models for Android
    Samir Talegaon and Ram Krishnan
    In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020.
  16. ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions
    Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu
    In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020.
  17. A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.
    Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan
    In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020.
  18. Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence
    Md. Farhan Haque and Ram Krishnan
    International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.
  19. A Formal Specification of Access Control In Android
    Samir Talegaon and Ram Krishnan
    International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.
  20. On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis
    Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan
    International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.
  21. Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data
    Randy Klepetko and Ram Krishnan
    4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), October 10-12, 2019, Rome, Italy
  22. SDN-RBAC: An Access Control Model for SDN Controller Applications
    Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu
    4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), October 10-12, 2019, Rome, Italy
  23. On the Feasibility of Attribute-Based Access Control Policy Mining
    Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan
    20th IEEE Conference on Information Reuse and Integration (IRI), July 30-August 1, 2019, Los Angeles, California.
  24. Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks
    Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu
    33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’19), July 15-17, 2019, Charleston, South Carolina, USA
  25. A Formal Access Control Model for SE-Floodlight Controller
    Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan
    ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (ACM SDN-NFV Security 2019), March 27, 2019, Dallas, Texas, USA
  26. Malware Detection in Cloud Infrastructures using Convolutional Neural Networks
    Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi Sandhu
    IEEE International Conference on Cloud Computing (IEEE CLOUD 2018), July 2-7, 2018, San Francisco, California, USA
  27. AARBAC: Attribute-Based Administration of
    Role-Based Access Control
    Jiwan Ninglekhu and Ram Krishnan
    IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2017), October 15-17, 2017, San Jose, California, USA
  28. Demystifying Android’s URI Permission System
    Samir Talegaon and Ram Krishnan
    International Conference on Secure Knowledge Management, October 6-7, 2017, Tampa, Florida, USA
  29. ARRA: Attribute-Based Role-Role Assignment
    Jiwan Ninglekhu and Ram Krishnan
    International Conference on Secure Knowledge Management, October 6-7, 2017, Tampa, Florida, USA
  30. Clustering-Based IaaS Cloud Monitoring
    Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu
    IEEE International Conference on Cloud Computing (IEEE Cloud ’17), June 25-30, 2017, Honolulu, Hawaii, USA
  31. Attribute Transformation for Attribute-Based Access Control
    Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
    ACM Workshop on Attribute-Based Access Control (ABAC 2016), Scottsdale, Arizona, March 24, 2017.
  32. An Attribute-Based Protection Model for JSON Documents
    Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
    International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, September 28-30, 2016.
  33. Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control
    Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
    Information Security Conference (ISC 2016), Honolulu, Hawaii, September 7-9, 2016.
  34. A Comparison of Logical Formula and Enumerated Authorization Policy ABAC Models
    Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
    Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016.
  35. PVDetector: A Detector of Privacy-Policy Violations for Android Apps
    Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, William Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux and Jianwei Niu
    International Conference on Mobile Software Engineering and Systems (MOBILESoft 2016), Austin, TX, May 14-22, 2016.
  36. Toward a Framework for Detecting Privacy Policy Violation in Android Application Code
    Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, William Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux and Jianwei Niu
    International Conference on Software Engineering (ICSE 2016), Austin, TX, May 14-22, 2016.
  37. Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy
    Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
    ACM Workshop on Attribute-Based Access Control (ABAC 2016), New Orleans, Louisiana, March 11, 2016.
  38. Attributes Enhanced Role-Based Access Control Model
    Qasim Mahmood Rajpoot, Christian Damsgaard Jensen and Ram Krishnan
    International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Valencia, Spain, September 1-2, 2015.
  39. Integrating Attributes into Role-Based Access Control
    Qasim Mahmood Rajpoot, Christian Damsgaard Jensen and Ram Krishnan
    Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Fairfax, VA, July 13-15, 2015.
  40. Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    ACM Symposium on Access Control Models and Technologies (ACM SACMAT 2015), June 1-3, 2015, Vienna, Austria.
  41. Authorization Federation in IaaS Multi Cloud
    Navid Pustchi, Ram Krishnan and Ravi Sandhu
    International Workshop on Security in Cloud Computing (SCC 2015), April 14-17, 2015, Singapore
    (held in conjunction with ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)).
  42. Secure Information and Resource Sharing in Cloud (poster)
    Amy Zhang, Ram Krishnan and Ravi Sandhu
    ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, March 2-4, 2015. Poster: [pdf] [pptx].
  43. Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, March 2-4, 2015.
  44. Smartphone-based Secure Authenticated Session Sharing in Internet of Personal Things
    Ram Krishnan and Jiwan Ninglekhu
    Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications, San Francisco, CA, February 10-11, 2015.
  45. Secure Information and Resource Sharing in Cloud Infrastructure as a Service
    Amy Zhang, Ram Krishnan and Ravi Sandhu
    ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014), November 3, 2014, Scottsdale, AZ.
  46. Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS
    Xin Jin, Ram Krishnan and Ravi Sandhu
    IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014), Miami, Florida, October 22-25, 2014.
  47. A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    International Conference on Network and System Security (NSS 2014), October 15-17, 2014, Xi’an, China.
  48. Cloud Computing Benchmarking: A Survey
    Carlos Vazquez, Ram Krishnan and Eugene John
    International Conference on Grid & Cloud Computing and Applications (GCA 2014), July 21-24, 2014, Las Vegas, NV.
  49. Reachability Analysis for Role-based Administration of Attributes
    Xin Jin, Ram Krishnan and Ravi Sandhu
    ACM Digital Identity Management Workshop, November 8, 2013, Berlin, Germany.
  50. Relational Abstraction in Community-Based Secure Collaboration
    Philip Fong, Pooya Mehregan and Ram Krishnan
    ACM Conference on Computer and Communications Security (ACM CCS), November 4-8, 2013, Berlin, Germany.
  51. A Framework for Risk-Aware Role Based Access Control
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    IEEE Symposium on Security Analytics and Automation (IEEE SafeConfig 2013), October 14-16, 2013, Washington DC.
  52. Towards An Attribute Based Constraints Specification Language
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust, September 8-14, 2013, Washington DC.
  53. Design of a Curriculum on Cloud Computing
    Ram Krishnan and Eugene John
    International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS’13), July 22-25, 2013, Las Vegas, NV.
  54. Risk-Aware RBAC Sessions
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    International Conference on Information Systems Security (ICISS 2012), Guwahati, India , December 15-19, 2012.
  55. RABAC: Role-Centric Attribute-Based Access Control
    Xin Jin, Ravi Sandhu and Ram Krishnan
    International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2012), St. Petersburg, Russia, October 17-20, 2012
    Published as Springer Lecture Notes in Computer Science Vol. 7531, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2012.
  56. A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders
    Khalid Bijon, Tahmina Ahmed, Ravi Sandhu and Ram Krishnan
    IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing(CollaborateCom 2012), October 14–17, 2012, Pittsburgh, PA.
  57. Towards provenance and risk-awareness in social computing
    Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram Krishnan, Jaehong Park and Ravi Sandhu
    International Workshop on Secure and Resilient Architectures and Systems (SRAS 2012), September 19–23, 2012, Minneapolis, MN.
  58. A role-based administration model for attributes
    Xin Jin, Ram Krishnan and Ravi Sandhu
    International Workshop on Secure and Resilient Architectures and Systems (SRAS 2012), September 19–23, 2012, Minneapolis, MN.
  59. Design and Low Power VLSI Implementation of Triple-DES Algorithm
    Alexandra Camacho, Eugene John and Ram Krishnan
    World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’12), Las Vegas, NV, July 16-19, 2012.
  60. Towards Security Policy and Architecture for Managing Implantable Medical Devices
    Ram Krishnan, Eugene John and Manoj Panday
    World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’12), Las Vegas NV, July 16-19, 2012.
  61. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
    Xin Jin, Ram Krishnan and Ravi Sandhu
    Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012.
  62. A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems
    Khalid Bijon, Ravi Sandhu and Ram Krishnan
    IEEE International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012), Denver, CO, May 24th, 2012.
  63. Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing
    Ram Krishnan and Ravi Sandhu
    International Conference on Information Systems Security (ICISS 2011), Kolkata, India, December 15-19, 2011. Detailed version with proof.
  64. RT-Based Administrative Models for Community Cyber Security Information Sharing
    Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan
    IEEE International Workshop on Trusted Collaboration (TrustCol 2011), Orlando, Florida, October 15, 2011.
  65. Towards a Discipline of Mission-Aware Cloud Computing
    Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachry
    ACM Cloud Computing Security Workshop (CCSW 2010), Oct 08, 2010, Chicago, Illinois.
    (held in conjunction with ACM Conference on Computer and Communications Security (CCS 2010))
  66. Towards Secure Information Sharing Models for Community Cyber Security
    Ravi Sandhu, Ram Krishnan and Greg White
    IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing, Oct 09-12, 2010, Chicago, Illinois.
  67. Group-Centric Models for Secure and Agile Information Sharing
    Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough
    International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS)
    , September 8-11, 2010, St. Petersburg, Russia. Springer Lecture Notes in Computer Science.
  68. Towards a Framework for Group-Centric Secure Collaboration
    Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough
    IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing, Nov 11-14, 2009, Crystal City, Washington D.C.
  69. A Hybrid Enforcement Model for Group-Centric Secure Information Sharing
    Ram Krishnan and Ravi Sandhu
    IEEE International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada. Detailed Version.
  70. Foundations for Group-Centric Secure Information Sharing Models
    Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough
    ACM Symposium on Access Control Models and Technologies (SACMAT), June 3-5, 2009, Stresa, Italy
  71. Enforcement Architecture and Implementation Model for Group-Centric Information Sharing
    Ram Krishnan and Ravi Sandhu
    International Workshop on Security and Communication Networks (IWSCN), May 20-22, 2009, Trondheim, Norway.
  72. A Conceptual Framework for Group-Centric Secure Information Sharing Model
    R am Krishnan, Ravi Sandhu , Jianwei Niu and William Winsborough
    ACM Symposium on Information, Computer and Communications Security (ASIACCS)
    , March 10 – 12, 2009, Sydney, Australia.
  73. Stale-Safe Security Properties for Group-Based Secure Information Sharing
    Ram Krishnan, Jianwei Niu, Ravi Sandhu and William Winsborough
    ACM workshop on Formal Methods in Security Engineering (FMSE). Oct 27- Oct 31, 2008, Alexandria, Virginia, USA.
  74. A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems
    Manoj Sastry, Ram Krishnan and Ravi Sandhu
    International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS) . September 13-15, 2007, St. Petersburg, Russia. Detailed version.
  75. PEI Models towards Scalable, Usable and High-Assurance Information Sharing
    Ram Krishnan, Ravi Sandhu and Kumar Ranganathan
    ACM Symposium on Access Control Models and Technologies (SACMAT) . June 20-22, 2007, Nice-Sophia Antipolis, France. Detailed version.
  76. Efficient and Reliable Link State Information Dissemination
    N. Ansari, G. Cheng, and Ram N. Krishnan
    IEEE Communications Letters, Vol. 8, No. 5, pp. 317-319, May 2004.

Journal Publications

 

  1. Visualizing Convolutional Neural Network Models’ Sensitivity to Nonnatural Data Order
    Randy Klepetko and Ram Krishnan
    Springer Information System Frontiers (Sep 2022). https://doi.org/10.1007/s10796-022-10333-0
  2. David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan and Yufei
    Huang
    On the Role of Deep Learning Model Complexity in Adversarial Robustness for Medical Images.
    BMC Medical Informatics and Decision Making, Springer Nature Series, Vol 22, Article 160, June 2022. https://doi.org/10.1186/s12911-022-01891-w
  3. Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Md. Farhan Haque and Ram Krishnan
    Springer Information System Frontiers (Feb 2021). https://doi.org/10.1007/s10796-020-10103-7
  4. A Formal Specification of Access Control in Android with URI Permissions
    Samir Talegaon and Ram Krishnan
    Springer Information System Frontiers (Nov 2020). https://doi.org/10.1007/s10796-020-10066-9
  5. Administrative Models for Role Based Access Control in Android
    Samir Talegaon and Ram Krishnan
    Journal of Internet Services and Information Security, Vol. 10, Issue 3, pp 31-46, August 2020.
  6. Policy Review in Attribute Based Access Control – A Policy Machine Case Study
    Sherifdeen Lawal and Ram Krishnan
    Journal of Internet Services and Information Security, Vol. 10, Issue 2, pp 67-81, May 2020.
  7. Algorithms for Joint Sensor and Control Nodes Selection in Dynamic Networks
    Sebastian Nugroho, Ahmad Taha, Nikolaos Gatsis, Tyler Summers and Ram Krishnan
    Automatica, Volume 106, August 2019, Pages 124-133.
  8. Access Control in Cloud IaaS
    Yun Zhang, Ram Krishnan , Farhan Patwa and Ravi Sandhu
    In Security, Privacy, and Digital Forensics in the Cloud (eds L. Chen, H. Takabi and N. Le‐Khac), 2019.
  9. Access Control in Cloud IaaS. In Security, Privacy, and Digital Forensics in the Cloud (eds L. Chen, H. Takabi and N. Le‐Khac).
  10. Periodic Virtual Hierarchy: A Trust Model for Smart Grid Devices
    Arezou Moussavi-Khalkhali, Ram Krishnan, and Mo Jamshidi
    International Journal of Security and Its Applications, Vol. 10, No. 11, November 2016.
  11. Sequence Diagram Aided Privacy Policy Specification
    Hui Shen, Ram Krishnan, Rocky Slavin, and Jianwei Niu
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Vol. 13, No. 3, pp. 381-393, May-June 1 2016.
  12. Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning
    Carlos Vazquez, Ram Krishnan and Eugene John
    Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), Vol 6, No. 3, pp 87-110, September 2015.
  13. Design And Implementation of Low-Power Nanoscale Cryptosystem for Group-Centric Secure Information Sharing
    Valliyappan Valliyappan, Eugene John, Ram Krishnan and Sruthi Nanduru
    Research Briefs on Informaiton & Communication Technology Evolution (ReBICTE), Vol. 1, No. 20, August 31, 2015.
  14. Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
    Sazzad Masud and Ram Krishnan
    Journal of IT CoNvergence PRActice (INPRA), Vol. 3, No. 2, pp 1-24, June 2015.
  15. Securing Implantable Cardioverter Defibrillators Using Smartphones
    Jiwan Ninglekhu, Ram Krishnan, Eugene John, and Manoj Panday
    Journal of Internet Services and Information Security, Vol. 5, Issue 2, pp 47-64, May 2015.
  16. Constraints Specification in Attribute Based Access Control
    Khalid Bijon, Ram Krishnan and Ravi Sandhu
    IEEE/ASE Science Journal, Vol. 2, No. 3, 2013, pp 131-144.
  17. Collaboration in Multicloud Computing Environments: Framework and Security Issues
    Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino
    IEEE Computer, Vol. 46, Issue 2, pp 76-84, Februrary 2013.
  18. Group-Centric Secure Information Sharing Models for Isolated Groups
    Ram Krishnan, Jianwei Niu, Ravi Sandhu and William H. Winsborough
    ACM Transactions on Information and System Security (ACM TISSEC), Vol. 14, Issue 3, pp 1-29, 2011. Electronic Appendix. NuSMV Code (model checking).